MSI-5010
×
MSI-5010 Foundations of Information TechnologyThis course is a survey course on information technology (IT). It is designed to give students ample opportunity to review critically emerging trends and implications for business managers and IT professionals. Topics covered include IT foundation concepts, data/information management systems, networking systems, enterprise models/systems, IT management processes, IT security, and IT ethics. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Foundations of Information Technology* | 3 |
MSI-5020
×
MSI-5020 Telecommunications and NetworkingThis course examines data communication and networking technologies from the business perspective. Topics covered include the networked enterprise, telecommunication network models, communication hardware, and trends and emerging technology, such as social media, mobile computing, cloud computing, big data, and the internet of things (IoT). Emphasis is on data communications as an integral element of business. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Telecommunications and Networking | 3 |
MSI-5030
×
MSI-5030 Object-Oriented Application DevelopmentThis course provides students with knowledge and skills for object-oriented design and implementation of software applications. Students will learn to apply object-oriented concepts in solving computational problems and implementing structured and easily maintainable software solutions. The course also covers concepts on algorithmic design for problem solving and computer language mechanics. Advisory: This course is designed for students with a basic understanding of computer programming. Specific programming skills or previous programming experience is not required. However, object-oriented application development will be fully explored so having a basic, working knowledge of computer programming is encouraged. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Object-Oriented Application Development | 3 |
MSI-5040
×
MSI-5040 Information Systems Analysis, Modeling, and DesignThe focus of this course is on the identification of an organization problem, the goals and the purpose of information technology (IT) systems, and how to carry out all the activities in the analysis and design of the systems. It addresses the design phases and all the techniques that are used to carry out the activities using a structured approach. Students will be required to apply these techniques to a work group project. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Information Systems Analysis, Modeling, and Design | 3 |
MSI-5050
×
MSI-5050 Principles of Database DesignThis course covers most of the major advancements in the technology of the design, development, and management of database management systems (DBMS) as well as the theoretical concepts and applications of DBMS. Students will have hands-on experience through case study exercises and the design and implementation of projects. Note: This course requires that students use Microsoft Access software, which is a Windows-based product and will not run on Macs. Students can run this software and other Windows software on a Mac using Apple's Boot Camp technology or third-party virtualization tools like Parallels or VMWare Fusion. These tools make it possible to run Mac OSX and a Windows operating system side by side. This solution will require a Windows license. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Principles of Database Design | 3 |
APS-5100
×
APS-5100 Project Management for TechnologyThis course introduces project management from the standpoint of a manager who must organize, plan, implement, and control tasks to achieve an organization's schedule, budget, and performance objectives. Tools and concepts such as project charter, scope statement, work breakdown structure, project estimating, and scheduling methodologies are studied. Students will practice with Microsoft Project software to be able to manage a project from start to deployment. What is a project? How is it managed? What is the best approach? This course will answer those questions and many more. This is an opportunity to learn the project management fundamentals that can guide a project through a maze of challenges to successful completion. Successful projects do not occur by luck or by chance. In fact, many projects do not achieve their organization's goals. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Project Management for Technology | 3 |
CYB-5210
×
CYB-5210 Foundations of Utility CybersecurityThis course introduces foundational cybersecurity concepts applied to utilities as part of critical infrastructure. Topics covered include: fundamental security concepts and nomenclature; types of utility networks and systems including information technology (IT) and operational technology (OT), such as industrial control systems (ICS) and supervisory control and data acquisition (SCADA); risk management concepts; the pairing of threats to defensive countermeasures; introduction to applicable standards and control frameworks; and presenting cybersecurity plans to decision makers. This course lays the foundation for the graduate certificate. It is recommended that this course be taken first. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Foundations of Utility Cybersecurity | 3 |
CYB-5220
×
CYB-5220 Cybersecurity Risk Management in Utility EnvironmentsIn this course, students will learn how to identify applicable cybersecurity risk mitigation models and apply them in an organizational context. They will develop the knowledge and skills needed to make recommendations related to the choice of risk mitigation security controls and to provide oversight for the implementation of those controls within information technology (IT) and operational technology (OT) systems. This course will give students the tools to develop risk models that reflect the organization's unique governance structure and corporate culture. Using risk analyses that are predicated upon a holistic risk picture (business, environment, compliance, etc.) of the organization, students will learn how to articulate and defend risk allocation recommendations to accept, transfer, mitigate, or ignore risk, and to communicate cybersecurity risks to peers and senior management in both IT and OT. This course will also expose students to relevant international utility-related cybersecurity regulations, standards, and guidelines. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Cybersecurity Risk Management in Utility Environments | 3 |
CYB-5230
×
CYB-5230 Protective Security Controls in Utility Systems and NetworksIn this course students will learn how to identify, develop, and apply security controls in utility information technology (IT) and operational technology (OT) environments with a focus on protective security controls. These controls are implemented to mitigate inherent risks and reduce the chances of utility systems being compromised. Such controls include identity and access management, awareness and training, asset management, secure network architecture and segmentation, secure coding practices, personnel security, and physical security. Students will use risk-based frameworks, regulations, standards, best practices, and security control catalogs to identify and select applicable protective controls in utility environments. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Protective Security Controls in Utility Systems and Networks | 3 |
CYB-5240
×
CYB-5240 Monitoring, Detection, Response, and Recovery in Utility EnvironmentsThe students will learn methods and techniques for monitoring information technology (IT) and operational technology (OT) environments. Along with developing an expertise in system monitoring techniques, students will learn methods for detecting compromise and develop strategies for effectively responding to and recovering from compromise. Students will learn methods and techniques such as network baselining, perimeter and internal monitoring and defense, situational awareness, intrusion detection, detecting exploits, "kill chain" management, event analysis and correlation, incident response, evidence collection and preservation, and system recovery and restoration. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Monitoring, Detection, Response, and Recovery in Utility Environments | 3 |
CYB-5250
×
CYB-5250 Integrating Cybersecurity into the System Life CycleThis course focuses on integrating security into the entire system and solution life cycle. Topics include system planning, architecture, design, acquisition, development, implementation/operation, sustainment, and disposal. Students will learn the importance of ensuring that security practices are identified and integrated into utility networks and systems projects. In addition, this course will help students develop knowledge and skills needed for integrating security requirements into technology acquisitions and identifying and managing supply chain risks across life cycle. Using case studies, students will apply concepts learned throughout the program to solve real-world utility and network system security challenges. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Integrating Cybersecurity into the System Life Cycle | 3 |
APS-7000
×
APS-7000 Master Project in Applied Science and TechnologyThe Master Project in Applied Science and Technology is designed to provide a guided in-depth experience in defining, measuring, analyzing, improving, and controlling a significant opportunity or challenge relevant to the learner's applied science or technology workplace or profession. The learner will be expected to acquire knowledge, apply real-life experience, and conduct research to make recommendations that are based upon solid data and benchmarking. Credits: 6 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Master Project in Applied Science and Technology | 6 |
Total Credit Hours: 36-39